We use cookies to ensure that we give you the best experience on our website. By
continuing to browse, we are assuming that you have no objection in accepting cookies.
You can change your cookie
settings at any time.

Firewall Module overview

When you first install BullGuard you will be asked to restart the computer to complete the Firewall installation. That’s because the Firewall driver that provides the traffic filtering features can only be installed during the Windows start-up process.

Once you restarted the computer, you can start using the Firewall and configure it to match both your security requirements and, if needed, network characteristics.

Firewall rules: click the Configure button to access the Firewall rules. There you can manage applications that require an Internet connection or fine-tune the Firewall by editing advanced rules.

Banned hosts: this option allows you to manage the IPs for remote computers that you want to block from connecting or communicating with your computer.

Network activity and logs: the Network activity section shows you an overview of the current applications that are monitored by BullGuard and their adjacent network connection. The FirewallLogs sectionallowsyou to see all the connections that have been active on your computer in a real-time, up-to-date table.

Settings: opens the section where you candefine how the Firewall engine manages the traffic on your computer.

About firewalls

A computer without an active Firewall is vulnerable to attacks within the first minute of being exposed to a public network, such as the internet.

For a long time viruses were the main concern in terms of computer security. That’s not the case anymore. That’s why only having regular Antivirus software installed is simply not enough to ensure a decent security level for the computer. It only takes one unprotected computer in a network for the security of every single computer in that network to be compromised, jeopardizing data privacy, system/network stability and personal information safety.

A firewall will prevent any unauthorized access to your computer and reject unrequested connections. Working hand in hand with the Antivirus software, it will drastically increase the security level of the computer. Unfortunately, as it’s practically impossible to ensure 100% safety for a computer connected to a network, it is vital to keep both the security applications and all other software applications on your computer up-to-date. Up-dated software and risk awareness make up the best way to minimize the risks of being connected and will greatly reduce the chances of being the target of network attacks.

There are two main types of firewalls:

Hardware Firewalls - Devices that are specifically built for network traffic filtering. They range from external devices to components that are incorporated within routers or even computer motherboards. They need specific software to be installed on your computer which will allow you to configure applications, port or protocol exceptions lists and customize the traffic filtering process.

Software Firewalls - Software installed on your computer that will perform the same traffic filtering as a Hardware Firewall.

BullGuard Firewall

The Firewall engine operates as a separate system service. That means that the Firewall can be operational even when the BullGuard application is not actually running, to secure the computer against network attacks. Thus, you will be protected against network attacks round-the-clock.

The BullGuard Firewall features a reliable ‘intrusion detection system’ designed to protect the computer against network attacks. This system provides protection against most types of network attacks and, when needed, can be altered to either increase or decrease the security level according to your needs. You can do this through the application management system, where you can also decide which programs may use the internet connection.

The Firewall has access to a ‘Known Applications’ database for most Windows processes and commonly-used applications. It will use this list to determine which applications it can trust and automatically allow them access to your Internet connection. You can adapt the Firewall to almost any type of network through advanced customizations.